Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

被引:52
作者
Hayashi, Masahito [1 ,2 ]
Nakayama, Ryota [1 ,3 ]
机构
[1] Nagoya Univ, Grad Sch Math, Chikusa Ku, Nagoya, Aichi 464860, Japan
[2] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117542, Singapore
[3] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, Sendai, Miyagi 9808579, Japan
基金
新加坡国家研究基金会;
关键词
decoy method; finite-key length; BB84; protocol; failure probability of phase error correction; interval estimation; per cent point; COMPOSABLE PRIVACY AMPLIFICATION; QUANTUM CRYPTOGRAPHY; INFORMATION; ADVERSARIES; QKD;
D O I
10.1088/1367-2630/16/6/063009
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.
引用
收藏
页数:36
相关论文
共 59 条
[1]  
Akaike H., 1973, 2 INT S INFORM THEOR, P267
[2]  
[Anonymous], 1976, Suri-Kagaku (Mathematical Sciences)
[3]  
Asai T., 2011, ISEC2010121 IEICE
[4]  
Ben-Or M, 2005, LECT NOTES COMPUT SC, V3378, P386
[5]  
BENNETT CH, P IEEE INT C COMP SY, P175
[6]   Upper bounds for the secure key rate of the decoy-state quantum key distribution [J].
Curty, Marcos ;
Moroder, Tobias ;
Ma, Xiongfeng ;
Lo, Hoi-Kwong ;
Luetkenhaus, Norbert .
PHYSICAL REVIEW A, 2009, 79 (03)
[7]   Practical issues in quantum-key-distribution postprocessing [J].
Fung, Chi-Hang Fred ;
Ma, Xiongfeng ;
Chau, H. F. .
PHYSICAL REVIEW A, 2010, 81 (01)
[8]   Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks [J].
Furrer, F. ;
Franz, T. ;
Berta, M. ;
Leverrier, A. ;
Scholz, V. B. ;
Tomamichel, M. ;
Werner, R. F. .
PHYSICAL REVIEW LETTERS, 2012, 109 (10)
[9]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)
[10]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195